|Numéro de publication||US7114068 B2|
|Type de publication||Octroi|
|Numéro de demande||US 10/698,128|
|Date de publication||26 sept. 2006|
|Date de dépôt||31 oct. 2003|
|Date de priorité||31 oct. 2003|
|État de paiement des frais||Payé|
|Autre référence de publication||US20050097310|
|Numéro de publication||10698128, 698128, US 7114068 B2, US 7114068B2, US-B2-7114068, US7114068 B2, US7114068B2|
|Inventeurs||Simon C. Chu, Richard A. Dayan, James L. Matlock, David B. Rhoades|
|Cessionnaire d'origine||International Business Machines Corporation|
|Exporter la citation||BiBTeX, EndNote, RefMan|
|Citations de brevets (2), Référencé par (10), Classifications (12), Événements juridiques (6)|
|Liens externes: USPTO, Cession USPTO, Espacenet|
The present invention is related to the subject matter of the following commonly assigned, U.S. patent application Ser. No. 10/674,776 entitled “Method and System for Restricting DHCP Servers” and filed Sep. 30, 2003. The content of the above-referenced application is incorporated herein by reference.
1. Technical Field
The present invention relates in general to the field of computers, and in particular to multiple blade servers housed in a server chassis. Still more particularly, the present invention relates to a method and system for filtering, through a secure remote supervisor, responses from Pre-boot eXecution Environment (PXE) servers to a server blade's request for a boot program, such that responses to the request for the boot program are only utilized from trusted PXE servers.
2. Description of the Related Art
Server blade computers offer multiple server blades (computers mounted on separate boards) in a single chassis (blade chassis). Although each server blade may be under at least partial control of primary server blade in the chassis, each server blade typically functions as an independent server to specific clients. A typical arrangement of such as system is shown in
A PXE boot server network 108 is connected to blade chassis 102 and the individual server blades 103 via network 106. Each of the server blades 103 may utilize a network boot protocol known as Pre-boot eXecution Environment (PXE). PXE allows server blade 103 to request a network boot program from a boot server in the PXE boot server network 108. Such a boot server can provide a boot image that can be used to load a new operating system (OS), flash a Basic Input/Output System (BIOS) memory, or even erase data on a local hard disk.
To download a boot program, server blade 103 broadcasts a request to PXE boot server network 108. One or more of the PXE boot servers in PXE boot server network 108 respond back to server blade 103 offering a requested boot program. If responses from multiple boot servers from PXE boot server network 108 are put on network 106, then server blade 103 typically responds to the first request response to arrive a server blade 103.
A network boot of server blade 103 as described is not secure, since the broadcasted boot request can result in a responsive offer from any PXE server connected to network 106, including an unauthorized PXE server attempting to tamper with the network. Thus, an unauthorized PXE boot server could result in possible undesired operations such as exposures to operational security and/or destroying data on a local fixed disk drive. What is needed, therefore, is a method and system for preventing booting from unauthorized PXE servers.
The present invention is directed to a method and system for managing a secure network boot of a server blade. The server blade is part of a server blade chassis, which holds multiple server blades that communicate with outside devices via a Pre-boot eXecution Environment (PXE) enabled network interface card. When a server blade receives a response from a PXE boot server offering a boot program download, a Remote Supervisory Adapter (RSA) card, managed by a remote manager, compares the identity of the responding PXE boot server with a list of trusted PXE boot servers. Only if the responding PXE boot server is on the list of trusted PXE boot servers will the server blade be allowed to use a boot program provided by the responding PXE boot server.
The above, as well as additional objectives, features, and advantages of the present invention will become apparent in the following detailed written description.
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further purposes and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, where:
With reference now to
Also connected to system bus 208 are system memory 210 and input/output (I/O) bus bridge 212. I/O bus bridge 212 couples I/O bus 214 to system bus 208, relaying and/or transforming data transactions from one bus to the other. Peripheral devices such as nonvolatile storage 216, which may be a hard disk drive, floppy drive, a compact disk read-only memory (CD-ROM), a digital video disk (DVD) drive, or the like, and input device 218, which may include a conventional mouse, a trackball, or the like, are connected to I/O bus 214. Server blade 203 communicates to a network 106 via a Pre-boot eXecution Environment (PXE) enabled Network Interface Card (NIC) 226 and to a hyper-secure Remote Supervisor Adapter (RSA) network 224 via an RSA card 222 as shown.
The exemplary embodiment shown in
With reference now to
However, if the bootstrap program of the server blade instructs the server blade to boot up using a network supplied boot program, then the server blade broadcasts a PXE service discovery request (block 308), asking a network of boot PXE servers to return a boot program appropriate for the server blade. The server blade then receives an acknowledgment reply from at least one PXE boot server (block 310). If the reply comes from a PXE server on the list of trusted PXE boot servers (query block 312), then the server blade sends a request to the PXE server for a download of the boot program offered by the PXE server (block 314), and then downloads and executes the boot program (block 316). In a preferred embodiment, this comparison is made by evaluating the responding boot PXE server's packets at Layer 3 of the Open Systems Interconnection (OSI) model. As known to those skilled in the art, upper OSI layers 7 through 4 support Application, Presentation, Session and Transport respectively, while lower OSI layers 2 and 1 support Data Link and Physical levels respectively. OSI layer 3 is the Network layer, which provides switching and routing criteria, including the establishment and use of Internet Protocol (IP) addresses. In a preferred embodiment of the present invention, the PXE enabled NIC performs Layer 3 packet filtering by comparing the IP address of the responding boot PXE server with those IP addresses listed in the list of trusted PXE servers. This permits Layer 3 filtering of Pre-boot eXecution Environment/Bootstrap Protocol (PXE/BootP) traffic, which is a preferred protocol for transmitted network boot programs in the present invention.
If the received response is from a boot PXE server that is NOT on the list of trusted PXE servers, then a system administrator (not shown) is notified (block 318). Preferably, this message is sent as a Simple Network Management Protocol (SNMP) trap or alert via the RSA network. A query is then made (query block 320) as to whether the server blade wishes to retry a network boot. If so, then there are two options (query block 322): evaluate another boot service acknowledgment reply to the previously broadcast request for a network boot, or else send a new request for a network boot directly to one of the PXE servers on the list of trusted PXE servers. In the majority of cases, multiple boot service acknowledgment replies to the previously broadcast boot program request are received by the server blade, and at least some, if not most of the responses, are from PXE servers on the trusted list. Thus, the usual decision will be to re-evaluate another of the boot service acknowledgment replies. However, if the server blade does not wish to evaluate these additional boot service acknowledgment replies, due to a predetermined criteria such exceeding a number of response evaluations, then a slower request directly to a PXE server on the trusted list is made. This direct request is typically slower and thus less efficient than a broadcast request since the chosen PXE server may be busy or have other operational problems. Alternatively, the direct request may be to a PXE server on a secure local area network (LAN), thus ensuring that the PXE server is authorized.
In another preferred embodiment, an information technology (IT) service organization is used to coordinate alternate types of PXE servers. One limitation of the PXE protocol is that more than one PXE server in a network causes chaos due to the lack of ability in the PXE client to determine what server is the preferred type of server. Referring now to
The present invention thus provides a method and service for securely controlling a network boot of a server blade. This prevents unauthorized boot servers, malicious or simply erroneously on a network, from booting up the server blade, thus resulting in an improperly functioning server blade. While the present invention focuses on server blades, it is understood that any computer utilizing the described invention, particularly those with remote supervisor capabilities, is within the purpose and scope of the present invention.
It should be understood that at least some aspects of the present invention may alternatively be implemented in a program product. Programs defining functions on the present invention can be delivered to a data storage system or a computer system via a variety of signal-bearing media, which include, without limitation, non-writable storage media (e.g., CD-ROM), writable storage media (e.g., a floppy diskette, hard disk drive, read/write CD ROM, optical media), and communication media, such as computer and telephone networks including Ethernet. It should be understood, therefore in such signal-bearing media when carrying or encoding computer readable instructions that direct method functions in the present invention, represent alternative embodiments of the present invention. Further, it is understood that the present invention may be implemented by a system having means in the form of hardware, software, or a combination of software and hardware as described herein or their equivalent.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
|Brevet cité||Date de dépôt||Date de publication||Déposant||Titre|
|US6314520 *||18 févr. 1999||6 nov. 2001||Roger R. Schell||Trusted workstation in a networked client/server computing system|
|US20040193867 *||31 mars 2003||30 sept. 2004||Zimmer Vincent J||Configurabel network boot management for hetergenous boot options|
|Brevet citant||Date de dépôt||Date de publication||Déposant||Titre|
|US7313685 *||23 juil. 2004||25 déc. 2007||Hewlett-Packard Development Company, L.P.||Unattended BIOS recovery|
|US7752659 *||14 févr. 2005||6 juil. 2010||Lenovo (Singapore) Pte. Ltd.||Packet filtering in a NIC to control antidote loading|
|US7966386 *||13 juil. 2009||21 juin 2011||Hitachi, Ltd.||Controlling method, computer system, and processing program of booting up a computer|
|US8607225 *||14 déc. 2011||10 déc. 2013||Oracle International Corporation||Managed upgrades of components in an integrated software and hardware system|
|US9424023||28 déc. 2011||23 août 2016||Oracle International Corporation||Unified system lifecycle for components in an integrated software and hardware system|
|US20060020845 *||23 juil. 2004||26 janv. 2006||Broyles Paul J Iii||Unattended BIOS recovery|
|US20060185011 *||14 févr. 2005||17 août 2006||International Business Machines Corporation||Packet filtering in a NIC to control antidote loading|
|US20090276511 *||13 juil. 2009||5 nov. 2009||Takao Nakajima||Controlling method, computer system, and processing program of booting up a computer|
|US20100024001 *||25 juil. 2008||28 janv. 2010||International Business Machines Corporation||Securing Blade Servers In A Data Center|
|US20120167073 *||14 déc. 2011||28 juin 2012||Oracle International Corporation||Managed upgrades of components in an integrated software and hardware system|
|Classification aux États-Unis||713/2, 713/100, 713/1|
|Classification internationale||G06F9/00, G06F15/177, G06F9/24, G06F9/445, G06F21/00|
|Classification coopérative||G06F9/4405, G06F21/575|
|Classification européenne||G06F9/44A2, G06F21/57B|
|4 oct. 2004||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHU, SIMON C.;DAYAN, RICHARD A.;MATLOCK, JAMES L.;AND OTHERS;REEL/FRAME:015216/0216;SIGNING DATES FROM 20040216 TO 20040319
|3 mai 2010||REMI||Maintenance fee reminder mailed|
|3 sept. 2010||FPAY||Fee payment|
Year of fee payment: 4
|3 sept. 2010||SULP||Surcharge for late payment|
|20 janv. 2014||FPAY||Fee payment|
Year of fee payment: 8
|10 nov. 2014||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:034194/0291
Owner name: LENOVO INTERNATIONAL LIMITED, HONG KONG
Effective date: 20140926